02-09-2017, 12:39 PM
Network security consists of policies and practices adopted to prevent and monitor unauthorized access, misuse, modification or denial of a computer network and accessible network resources. Network security involves authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authentication information that allows them to access information and programs within their authority. Network security encompasses a variety of computer networks, both public and private, used in day-to-day work; conducting transactions and communications between companies, government agencies and individuals. Networks can be private, such as within a company, and others that may be open to public access. Network security is involved in organizations, companies and other types of institutions. He does as his title explains: Secures the network, as well as the protection and supervision of the operations being carried out. The most common and easy way to protect a network resource is to give it a unique name and a corresponding password.
Network security starts with authentication, commonly with a username and password. Because this requires only one detail that authenticates the user name, that is, the password, it is sometimes called a one-factor authentication. With two-factor authentication, something is also used by the user (for example, a security token or dongle, an ATM card or a mobile phone); and with the authentication of three factors, something that the user 'is' is also used (eg, a fingerprint or retinal scan).
Once authenticated, a firewall enforces access policies, such as services that network users can access. Although effective to prevent unauthorized access, this component may fail to check for potentially harmful content, such as computer worms or Trojans that are transmitted over the network. Antivirus software or an intrusion prevention system (IPS) helps detect and inhibit the action of such malware. An anomaly-based intrusion detection system can also monitor the network as wire-shark traffic and can be registered for audit purposes and for further high-level analysis. Newer systems that combine unattended auto-learning with full scanning of network traffic can detect active network attackers against malicious intruders or external attackers who have committed to a machine or user account.
Network security starts with authentication, commonly with a username and password. Because this requires only one detail that authenticates the user name, that is, the password, it is sometimes called a one-factor authentication. With two-factor authentication, something is also used by the user (for example, a security token or dongle, an ATM card or a mobile phone); and with the authentication of three factors, something that the user 'is' is also used (eg, a fingerprint or retinal scan).
Once authenticated, a firewall enforces access policies, such as services that network users can access. Although effective to prevent unauthorized access, this component may fail to check for potentially harmful content, such as computer worms or Trojans that are transmitted over the network. Antivirus software or an intrusion prevention system (IPS) helps detect and inhibit the action of such malware. An anomaly-based intrusion detection system can also monitor the network as wire-shark traffic and can be registered for audit purposes and for further high-level analysis. Newer systems that combine unattended auto-learning with full scanning of network traffic can detect active network attackers against malicious intruders or external attackers who have committed to a machine or user account.